Adopting Data Mining Techniques on the Recommendations of Library Collections
|
|
- Donna Fisher
- 5 years ago
- Views:
Transcription
1 Adopting Data Mining Techniques on the Recommendations of Library Collections Shu-Meng Huang a, Lu Wang b and Wan-Chih Wang c a Department of Information Management, Hsing Wu College, Taiwan (simon@mail.hwc.edu.tw) b, c Graduate School of Management Sciences, Tamkang University, Taiwan (pheobemimilucky@hotmail.com) Correspondence: Shu-Meng Huang a Abstract In this research, the researchers explored not only the cluster of the readers with similar characteristics, but also the connection between the readers and the book collections of the library by using Data Mining techniques. By doing this, the library will be able to improve the interaction with its readers, and further increase the usage of library collections. The Modified Attribute-Oriented Induction (MAOI) method was introduced to deal with the multi-valued attribute table and further sort the readers into different clusters. Instead of using concept hierarchy and concept trees, MAOI method implemented the concept climbing and generalization of multi-valued attribute table with Boolean Algebra and modified Karnaugh Map, and described the clusters with concept description. On the other hand, the Chinese books in the library collections were classified into four groups with New Classification Science for Chinese Libraries (CCL). Not only the attributes of readers, but also the attributes of library collections borrowed by readers are included in the multi-valued attribute table. After the completion of induction, the reading preferences of the readers with the same characteristics can be learned. Keywords: Data Mining, Recommendations, MAOI, Multi-Valued Attribute I. INTRODUCTION Potential readers seeking information in a library often face a daunting, time and energy-consuming task. Given the immense body of data gathered in modern libraries, it can be difficult for these readers to quickly sift through the mass of information to uncover what they need. This difficulty can affect how often, and how willingly, readers make use of library s vast resources. Some studies[1][2], have indicated that one of the key aspects of a library s service and marketing success is how well they actively provide information to readers by means of personal service technology based on readers personal preferences and needs. In recent years, many e-commerce websites have adopted personal recommender information systems in an effort to increase their interaction with customers to generate a higher rate of return patronage[3][4]. Take YouTube as an example, the Recommended for you column provides viewers information related to the videos they just browsed;and on they analyze the pages customers have browsed, then actively recommend the books the customers might be interested. Thus, the application of this concept in the library must be able to improve the relationship between the library and the readers. In this research, a method of concept description in Data Mining was adopted Modified Attribute-Oriented Induction[5], to sort the readers into different clusters. Each cluster includes readers with similar characteristics and preferences. II. RELATED STUDIES There are mainly two recommender systems applied in online stores [6]: for the merchandise that customers would consume more often, such as books or movies, and for the merchandise that customers would not consume so often, such as cars or computers. The first recommender system analyzes the consumption records of the customers to uncover the customers preferences, and then provide advices. It usually adopts Data Mining technology, as well as personal service. But for the merchandise that customers don t buy so often, the advices based on the earlier consumption records may not achieve the expected results. The situation of readers making use of the collections of the library is similar to the consumption of the merchandise that customers buy more often. Therefore, many studies related to library recommendations adopt Data Mining technology to discover the relationship between readers and books. 2.1 Data Mining When facing massive data, Data Mining provides powerful and effective tools to transform the data into useful information and knowledge[7][8]. Table 1 is a summary of the functions and technologies frequently used in Data Mining[9]. The Market Basket Analysis is also named Association Rule Analysis. This technology can explore the connections between attributes or objects. And it s an appropriate means to dig the relationships between readers and books. But there are mass records in the library. When considering about analysis complication, execution efficiency and recommendation results, researchers
2 usually perform the grouping of the readers before analysis. Yu-Ling Cheng (2002) Jien-Hwa Tsao(2003) Chang-Ting Yang(2007) classified the readers based directly on reader s department. Ching-Shium Chen (2000) Yuan-Jing Zhang (2001) Chien-Yu Chen (2009) clustered the readers with Cluster Detection. Kuan-Hua Sun(2000) adopted Multilevel Association Rule Mining to discover the different characteristics of the readers who have different preferences. Yu-Ling Cheng (2003) adopted Memory-Based Reasoning to group the readers with the same background. Some of the methods adopted in the above mentioned studies are complicated, meanwhile, some are brief. But most of them only can deal with single-valued data. When facing multi-valued data, lots of pre-processing work must be done for further analysis. In this research, Modified Attribute-Oriented Induction, which was proposed by Shu-Meng Huang (2010), was adopted, to induct and sort the multi-valued data, such as reader s department and year. Table 1. Functions and technologies of Data Mining Function Affinity Classification Estimation Prediction Clustering Description Technology grouping Statistics ˇ ˇ ˇ ˇ ˇ ˇ Market Basket Analysis ˇ ˇ ˇ ˇ Memory-Based Reasoning ˇ ˇ ˇ ˇ Genetic algorithm ˇ ˇ Cluster Detection Link Analysis ˇ ˇ ˇ ˇ Decision Tree ˇ ˇ ˇ ˇ Artificial Neural Network ˇ ˇ ˇ ˇ ˇ 2.2 Modified Attribute-Oriented Induction (MAOI) Attribute-Oriented Induction Approach (AOI)was proposed in 1991 [10]. It appears in a form of described Data Mining[11], and can deal with different kinds of knowledge rules efficiently, such as characteristic rules, discrimination rules, quantitative rules, and data evolution regularities [12]. This approach is one of the most classification scheme in Data Mining [13]. The basic concept and steps of AOI include [14]: (1) Concept Hierarchy (2) Attribute-Removal (3) Concept-Tree climbing (4) Vote propagation (5) Attribute-Threshold Control (6) Rule transformation Though it s convenient making use of AOI to induct data into simple rule description, and some complicated procedures for data processing are eliminated as well. But different people make different Concept Hierarchies, and different definition leads to different results. The confidence would be low, if there is no apparent Concept Hierarchy between attributes. Besides, AOI only can deal with single-valued attribute data [3]. Therefore Shu-Meng Huang (2010) combine the concepts of Boolean bit and simplified Karnaugh map with AOI, named MAOI, to deal with multi-valued attribute data. Figure 1 presents the steps of MAOI. Table 2. is a database of high-frequent-crime areas in [3]. It s multi-valued attribute database. The researcher explained the steps of MAOI with it. Attribute table A B C Boolean Bit Modified K-map Induction Figure 1. The induction steps of Modified AOI Boolean Bit Transformation To decide a value s Boolean bit, a cutting point must be defined first. Taking the mean value of the attribute as the cutting point for that attribute, all the values in that attribute can be transformed. That means, if a value is
3 bigger than or equal to the cutting point, it s Boolean bit is 1. If a value is smaller than the cutting point, it s Boolean bit is 0. Table 3. presents the result after transformation. Area ID Table 2. Database of high-frequent-crime areas Gender Age Education <g 1,30> <g 2,70> <g 1,45> <g 2,55> <g 1,65> <g 2,35> <g 1,40> <g 2,60> <g 1,35> <g 2,65> <g 1,60> <g 2,40> <g 1,20> <g 2,80> <g 1,70> <g 2,30> <g 1,40> <g 2,60> <a 1,20><a 2,30> <a 1,25><a 2,35> <a 3,40> <a 1,35><a 2,25> <a 3,40> <a 1,20><a 2,40> <a 3,40> <a 1,30><a 2,20> <a 1,25><a 2,25> <a 1,10><a 2,40> <a 1,30><a 2,40> <a 3,30> <a 1,20><a 2,10> <a 3,70> <e 1,20><e 2,10> <e 3,40><e 4,30> <e 1,15><e 2,10> <e 3,35><e 4,30> <e 1,30><e 2,40> <e 3,10><e 4,20> <e 1,10><e 2,10> <e 3,40><e 4,40> <e 1,25><e 2,5> <e 3,40><e 4,30> <e 1,20><e 2,15> <e 3,35><e 4,30> <e 1,30><e 2,5> <e 3,35><e 4,30> <e 1,10><e 2,40> <e 3,40><e 4,10> <e 1,20><e 2,20> <e 3,30><e 4,30> <g 10 1,35> <a 1,20><a 2,30> <e 1,20><e 2,10> <g 2,65> <e 3,40><e 4,30> In this table, g1 mean male, g2 means female; a1means yang man, a2 means adult, a3 means old man; e1means primary education, e2 means secondary education, e3 means university education, e4 means institute of education Table 3.Database after Boolean bit transformation Area ID Gender Age Education Karnaugh Map of Attribute Age. a2,a3 a Figure 2. The Karnaugh Map of Age From Figure 2, it shows that 001 and 011 can be combined. That is, 001,011 0_1 _ means don t care With the same step, the education attribute can be simplified: 0011,1011 _ Data Replacement Table 4. presents the feature tha attribute values have been replaced with the simplified values inducted from Karnough Map. Table 4.Database after Karnaugh Map simplification Area ID Gender Age Education _1 _ _1 _ _1 _ _1 _ _1 _ _1 _ _1 _ _1 _ Scan and Recount Scan the database again, and count the rows with the same attribute values. There are 4 rules in table 5. Table 5. Database after scan and recount Gender age Education vote _1 0_ _1 _ Karnaugh Map Concept Karnaugh Map presents the simplification of Boolean Algebra in the way of intuitive graph. But to avoid double counting, the researcher simplified it. Only a2,a3 the nearest neighbors that have the largest added value will a1 be combined and simplified. Figure 2. is the The Descriptive Rules In table 5, the number 1 rule has the highest vote value. It can be described as: {<g 1,L><g 2,H>} {<a 1,L><a 3,H>} {<e 1,L><e 3,H> <e 4,H>} 70%
4 The interpretation of the rule: 70% of high-frequent-crime areas have more females, elderly people, university students and graduate students. III. RESEARCH METHOD 3.1 Research Process In this research, all the data came from a library in a college. After data selection, matching, pruning and replacement, the data was inducted by MAOI to generate descriptive rules. Figuer 3. is the research process. Figure 3. Research process 3.2 The Multi-Valued Table The data selected contains all the college students library records in Except some data pre-processing, the twelve departments were divided into three academies, and the library collections were divided into four groups by their book numbers according to New Classification Science for Chinese Libraries(CCL). Table 6. presents a database ready for further analysis. Attribute A stands for academy; a1 is the first academy, including departments of Accounting Information, Business of Administration, International Trade and Business, Marketing and Distribution Management, and Finance; a2 is the second academy, including the departments of Tourism Management, Hospitality Management, Travel Management, and Applied English; a3 is the third academy, including the departments of Information Management, Information Technology and Information Communication. Attribute B stands for student s year in the college; b1 is Freshman; b2 is Sophomore; b3 is Junior; b4 is sinor. Attribute C stands for gender; c1 is male, and c2is female. Attribute D stands for student s grade; d1is 90~100; d2 is 80~89; d3 is 70~79; d4 is under 69.Attribute E stands for the classification of the library collections; e1 is 000~299; e2 is300~499; e3 is 500~799; e4 is 800~999. Table 6. Database of student s records in the library Month ID A B C D E <a1,101><a2,111> <a3,83> <a1,117 ><a2,115> <a3,81> <a1,207><a2,191> <a3,143> <a1,203><a2,177> <a3,48> <a1,156><a2,154> <a3,102> <a1,136><a2,110> <a3,93> <a1,11><a2,4> <a3,19> <a1,6><a2,9> <a3,18> <a1,147><a2,151> <a3,117> <b1,2><b2,91> <b3,68><b4,134> <b1,1><b2,96> <b3,67><b4,149> <b1,3><b2,160> <b3,147><b4,231> <b1,3><b2,127> <b3,155><b4,240> <b1,1><b2,110> <b3,123><b4,178> <b1,3><b2,106> <b3,118><b4,112> <b1,0><b2,3> <b3,6><b4,25> <b1,0><b2,6> <b3,6><b4,21> <b1,92><b2,114> <b3,114><b4,95> <c1,134> <c2,161> <c1,167> <c2,146> <c1,295> <c2,246> <c1,252> <c2,176> <c1,194> <c2,218> <c1,178> <c2,161> <c1,21> <c2,13> <c1,22> <c2,11> <c1,176> <c2,239> <d1,9><d2,96> <d3,124><d4,66> <d1,28><d2,143> <d3,74><d4,68> <d1,45><d2,198> <d3,206><d4,92> <d1,38><d2,195> <d3,89><d4,106> <d1,56><d2,126> <d3,143><d4,87> <d1,31><d2,94> <d3,135><d4,79> <d1,0><d2,27> <d3,4><d4,3> <d1,2><d2,19> <d3,8><d4,4> <d1,48><d2,149> <d3,132><d4,86> <e1,36 ><e2,98 > <e3,75><e4, 194> <e1,44><e2,119> <e3,77><e4,201> <e1,98><e2,186> <e3,144><e4,380> <e1,87><e2,226> <e3,147><e4,294> <e1,62><e2,161> <e3,115><e4,248> <e1,67><e2,134> <e3,79><e4,226> <e1,5><e2,24> <e3,7><e4,6> <e1,3><e2,19> <e3,5><e4,8> <e1,70><e2,140> <e3,82><e4,282>
5 <a1,170><a2,199> <a3,131> <a1,177><a2,206> <a3,143> <a1,195><a2,192> <a3,152> <b1,78><b2,175> <b3,149><b4,98> <b1,76><b2,214> <b3,139><b4,97> <b1,121><b2,184> <b3,139><b4,95> <c1,269> <c2,231> <c1,253> <c2,273> <c1,285> <c2,254> <d1,70><d2,123> <d3,165><d4,142> <d1,63><d2,202> <d3,194><d4,67> <d1,76><d2,211> <d3,176><d4,76> <e1,69><e2,213> <e3,121><e4,302> <e1,67><e2,183> <e3,147><e4,331> <e1,63><e2,213> <e3,131><e4,324> Boolean Bit Transformation In the grid 1A, the data is <a1,101> <a2,111> <a3,83>. The total of these values is 295, and the average number is 295/3=98. When taking 98 as the cutting point, because (101>98.3), (111>98.3), and (83<98.3), the Boolean bit of 1A becomes 110. Repeat the steps mentioned above, we can transform all the attribute values into Boolean bit, as shown in table 7. But column E is a special column. Because every student can borrow more than one kind of books, we define the cutting point to be quarter of the number of the students in the month. That means the cutting point of column E equals to the cutting point of column B or D. Table 7. Database after Boolean bit transformation M. ID A B C D E Attribute B b1,b2 d1,d2 e1,e2 b3,b Attribute D d3,d4 Attribute E e3,e4 0111, _ , _ , _ Karnaugh Map Concept The Karnaugh maps of Attribute A, B, D, E are presented in figure4. a1 Attribute A a2,a ,110 1_0 Figure 4. The Karnaugh Map of Attribute A,B,D,E Data replacement Replace the attribute values with the rules inducted in figure 4 with Karnaugh Map, we complete table8. Table 8. Database after Karnaugh Map simplification M. ID A B C D E 1 1_ _0 01_1 2 1_ _0 01_1 3 1_0 011_ 10 01_0 01_1 4 1_0 011_ 10 01_0 01_1 5 1_0 011_ 01 01_0 01_1 6 1_0 011_ 10 01_0 01_ _ _0 0100
6 9 1_0 011_ 01 01_0 01_1 10 1_0 011_ _1 11 1_0 011_ 01 01_0 01_1 12 1_0 011_ 10 01_0 01_ Scan and Recount Table 9. Database after scan and recount A B C D E vote library can actively provide readers with appropriate recommendation, and consider the purchase strategy of the collections. sets of applications and a wider range of multi-valued tables, as the purposes to verify this algorithm and to discover the generalized knowledge from Relational Databases. 1 1_0 011_ 10 01_0 01_ _0 011_ 01 01_0 01_ _ _ _0 01_ _ _0 01_ _0 011_ _ The descriptive rules From table 9, the sum of the votes for rule number1, 2, and 3 is 9. Thus, rule number 1, 2, and 3 have included 75% of the data. And they are the 3 highest inducted rules in this research. They can be described as the following: (1){<a1,H><a3,L>} {<b1,l><b2,h><b3,h>} {<c1,h ><c2,l>} {<d1,l><d2,h><d4,>l} {<e1,l><e2,h ><e4,h>} 33.3% It means that there are about 33.3% readers who are males and in the second or third year of the first academy. Their grades are about 80~89. Their reading preference is on book number 300~499 and 800~999. (2) {<a1,h><a3,l>} {<b1,l><b2,h><b3,h>} {<c1,l><c2,h>} {<d1,l><d2,h><d4,>l} { <e1,l><e2,h><e4,h>} 25.0% It means that there are about 25% readers who are females and in the second or third year of the first academy. Their grades are about 80~89. Their reading preference is on book number 300~499 and 800~999. (3) {<a1,l><a2,l><a3,h>} {<b1,l><b2,l><b3,l> <b4,h>} {<c1,h><c2,l>} {<d1,l><d2,h><d 4,>L} {<e1,l><e2,h><e3,l><e4,l>} 16.6% It means that there are about 16.6% readers who are females and in the fourth year of the third academy. Their grades are about 80~89. Their reading preference is on book number 300~499. IV. Conclusion To improve library s service and marketing success, the readers needs should be satisfied. There are lots of methods proposed to analyze the relationships between readers and library collections. Most of them only can handle the single-valued attributes. But in our daily life, many information appear as multi-valued attributes. MAOI can induct multi-valued attributes directly, and present the results briefly and descriptively. In this research, 3 rules were uncovered to explain the characteristics of the readers and their reading preferences. They have accounted for about 75% information. Therefore, it s a successful induction. The
7 REFERENCE [1]Jun-Rong Huang, Using clusters to find the most adaptive recommendations of books Journal of Educational Media & Library Science, 43:3, pp , 2006 [2]Ou, J., Lin, S. and Li, J., The Personalized Index Service System in Digital Library, Proc. of the Third International Symposium on Cooperative Database Systems for Advanced Applications, pp92-99, 2001 [3]J. B. Schafer, J. A. Konstan, and J. Riedl, E-Commerce Recommendation Applications, Data Mining and Knowledge Discovery, 5(1), pp , 2001 [4]A. Ansari, S. Essengaier, and R. Kohli, Internet Recommendation Systems, Journal of Marketing Research, 37(3), 2000 [5]Shu-Meng Huang, A study on the Modified Attributed-Oriented-Induction Algorithm of Mining the Multi-Value Attribute Data, ICERM, pp62, 2010 [6]W.P. Lee, C.H. Liu, and C.C. Lu, Intelligent agentbased systems for personalized recommendations in Internet commerce, Expert Systems with Applications, vol. 22, no.4, pp , 2002 [7]M. S. Chen, J. Han and P. S. Yu, Data Mining : An Overview From a database Perspective, IEEE, Transactions on Knowledge and Data Engineering, Vol. 8, No.6, pp ,1996 [8]Fayyad, U.M., Data Mining and Knowledge Discovery :Making Sense Out of Data, IEEE Expert, Vol.11, Issue 5, pp20-25, 1996 [9]M.J.A. Berry and G. Linoff, Data Mining Techniques:For Marketing, Sales, and Customer Support, John Wiley & Sons [10]Y. Cai, N. Cercone, and J. Han, attribute-oriented induction in relational database, Knowledge Discovery in Databases,Ch 12, AAAI/MIT Press [11]Jiawei Han and Micheline Kamber, Data Mining : Concepts and Techniques (Second Edition), Morgan Kaufmann Pub, 2006 [12]J. Han, Y. Cai, and N. Cercone, Knowledge Discovery in Databases : An Attribute-Oriented Approach, In Proceedings of the 18 th VLDB Conference, Vancouver, British Columbia, Canada. Pp , 1992 [13]Yen-Liang Chen, Ching-Cheng Shen, Mining generalized knowledge from ordered data through attribute-oriented induction tecniques. European Journal of Operational Research, 166, pp , 2005 [14]J. Han, Y. Cai and N. Cercone, Data-Driven Discovery of Quantitative Rules in Relational Database, IEEE Transaction on Knowledge and Data engineering, Vol.5, No.1, February 1993
Ubiquitous Computing and Communication Journal (ISSN )
A STRATEGY TO COMPROMISE HANDWRITTEN DOCUMENTS PROCESSING AND RETRIEVING USING ASSOCIATION RULES MINING Prof. Dr. Alaa H. AL-Hamami, Amman Arab University for Graduate Studies, Amman, Jordan, 2011. Alaa_hamami@yahoo.com
More informationGeneralized Knowledge Discovery from Relational Databases
148 IJCSNS International Journal of Computer Science and Network Security, VOL.9 No.6, June 2009 Generalized Knowledge Discovery from Relational Databases Yu-Ying Wu, Yen-Liang Chen, and Ray-I Chang Department
More informationData Mining Technology Based on Bayesian Network Structure Applied in Learning
, pp.67-71 http://dx.doi.org/10.14257/astl.2016.137.12 Data Mining Technology Based on Bayesian Network Structure Applied in Learning Chunhua Wang, Dong Han College of Information Engineering, Huanghuai
More informationImproved Frequent Pattern Mining Algorithm with Indexing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.
More informationBuilding a Concept Hierarchy from a Distance Matrix
Building a Concept Hierarchy from a Distance Matrix Huang-Cheng Kuo 1 and Jen-Peng Huang 2 1 Department of Computer Science and Information Engineering National Chiayi University, Taiwan 600 hckuo@mail.ncyu.edu.tw
More informationUnderstanding Rule Behavior through Apriori Algorithm over Social Network Data
Global Journal of Computer Science and Technology Volume 12 Issue 10 Version 1.0 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: 0975-4172
More informationResearch and Application of E-Commerce Recommendation System Based on Association Rules Algorithm
Research and Application of E-Commerce Recommendation System Based on Association Rules Algorithm Qingting Zhu 1*, Haifeng Lu 2 and Xinliang Xu 3 1 School of Computer Science and Software Engineering,
More informationAn Improved Apriori Algorithm for Association Rules
Research article An Improved Apriori Algorithm for Association Rules Hassan M. Najadat 1, Mohammed Al-Maolegi 2, Bassam Arkok 3 Computer Science, Jordan University of Science and Technology, Irbid, Jordan
More informationStudy on the Application Analysis and Future Development of Data Mining Technology
Study on the Application Analysis and Future Development of Data Mining Technology Ge ZHU 1, Feng LIN 2,* 1 Department of Information Science and Technology, Heilongjiang University, Harbin 150080, China
More informationUsing Gini-index for Feature Weighting in Text Categorization
Journal of Computational Information Systems 9: 14 (2013) 5819 5826 Available at http://www.jofcis.com Using Gini-index for Feature Weighting in Text Categorization Weidong ZHU 1,, Yongmin LIN 2 1 School
More informationTemporal Weighted Association Rule Mining for Classification
Temporal Weighted Association Rule Mining for Classification Purushottam Sharma and Kanak Saxena Abstract There are so many important techniques towards finding the association rules. But, when we consider
More informationResearch on Design and Application of Computer Database Quality Evaluation Model
Research on Design and Application of Computer Database Quality Evaluation Model Abstract Hong Li, Hui Ge Shihezi Radio and TV University, Shihezi 832000, China Computer data quality evaluation is the
More informationThe Objectivity Measurement of Frequent Patterns
, October 20-22, 2010, San Francisco, USA The Objectivity Measurement of Frequent Patterns Phi-Khu Nguyen, Thanh-Trung Nguyen Abstract Frequent pattern mining is a basic problem in data mining and knowledge
More informationThe Fuzzy Search for Association Rules with Interestingness Measure
The Fuzzy Search for Association Rules with Interestingness Measure Phaichayon Kongchai, Nittaya Kerdprasop, and Kittisak Kerdprasop Abstract Association rule are important to retailers as a source of
More informationA Hierarchical Document Clustering Approach with Frequent Itemsets
A Hierarchical Document Clustering Approach with Frequent Itemsets Cheng-Jhe Lee, Chiun-Chieh Hsu, and Da-Ren Chen Abstract In order to effectively retrieve required information from the large amount of
More information2002 Journal of Software.. (stacking).
1000-9825/2002/13(02)0245-05 2002 Journal of Software Vol13, No2,,, (,200433) E-mail: {wyji,ayzhou,zhangl}@fudaneducn http://wwwcsfudaneducn : (GA) (stacking), 2,,, : ; ; ; ; : TP18 :A, [1],,, :,, :,,,,
More informationResearch on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1, Shengmei Luo 1, Tao Wen 2
International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) Research on Parallelized Stream Data Micro Clustering Algorithm Ke Ma 1, Lingjuan Li 1, Yimu Ji 1,
More informationArbee L.P. Chen ( 陳良弼 )
Arbee L.P. Chen ( 陳良弼 ) Asia University Taichung, Taiwan EDUCATION Phone: (04)23323456x1011 Email: arbee@asia.edu.tw - Ph.D. in Computer Engineering, Department of Electrical Engineering, University of
More informationResearch on Applications of Data Mining in Electronic Commerce. Xiuping YANG 1, a
International Conference on Education Technology, Management and Humanities Science (ETMHS 2015) Research on Applications of Data Mining in Electronic Commerce Xiuping YANG 1, a 1 Computer Science Department,
More informationMining Quantitative Association Rules on Overlapped Intervals
Mining Quantitative Association Rules on Overlapped Intervals Qiang Tong 1,3, Baoping Yan 2, and Yuanchun Zhou 1,3 1 Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China {tongqiang,
More informationData Mining in the Application of E-Commerce Website
Data Mining in the Application of E-Commerce Website Gu Hongjiu ChongQing Industry Polytechnic College, 401120, China Abstract. With the development of computer technology and Internet technology, the
More informationThe k-means Algorithm and Genetic Algorithm
The k-means Algorithm and Genetic Algorithm k-means algorithm Genetic algorithm Rough set approach Fuzzy set approaches Chapter 8 2 The K-Means Algorithm The K-Means algorithm is a simple yet effective
More informationDATA WAREHOUSING IN LIBRARIES FOR MANAGING DATABASE
DATA WAREHOUSING IN LIBRARIES FOR MANAGING DATABASE Dr. Kirti Singh, Librarian, SSD Women s Institute of Technology, Bathinda Abstract: Major libraries have large collections and circulation. Managing
More informationInternational Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16
The Survey Of Data Mining And Warehousing Architha.S, A.Kishore Kumar Department of Computer Engineering Department of computer engineering city engineering college VTU Bangalore, India ABSTRACT: Data
More informationConcept Tree Based Clustering Visualization with Shaded Similarity Matrices
Syracuse University SURFACE School of Information Studies: Faculty Scholarship School of Information Studies (ischool) 12-2002 Concept Tree Based Clustering Visualization with Shaded Similarity Matrices
More informationTop-k Keyword Search Over Graphs Based On Backward Search
Top-k Keyword Search Over Graphs Based On Backward Search Jia-Hui Zeng, Jiu-Ming Huang, Shu-Qiang Yang 1College of Computer National University of Defense Technology, Changsha, China 2College of Computer
More informationDynamic Clustering of Data with Modified K-Means Algorithm
2012 International Conference on Information and Computer Networks (ICICN 2012) IPCSIT vol. 27 (2012) (2012) IACSIT Press, Singapore Dynamic Clustering of Data with Modified K-Means Algorithm Ahamed Shafeeq
More informationA Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm
A Technical Analysis of Market Basket by using Association Rule Mining and Apriori Algorithm S.Pradeepkumar*, Mrs.C.Grace Padma** M.Phil Research Scholar, Department of Computer Science, RVS College of
More informationChapter 28. Outline. Definitions of Data Mining. Data Mining Concepts
Chapter 28 Data Mining Concepts Outline Data Mining Data Warehousing Knowledge Discovery in Databases (KDD) Goals of Data Mining and Knowledge Discovery Association Rules Additional Data Mining Algorithms
More informationA Novel method for Frequent Pattern Mining
A Novel method for Frequent Pattern Mining K.Rajeswari #1, Dr.V.Vaithiyanathan *2 # Associate Professor, PCCOE & Ph.D Research Scholar SASTRA University, Tanjore, India 1 raji.pccoe@gmail.com * Associate
More informationAn Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining
An Efficient Algorithm for Finding the Support Count of Frequent 1-Itemsets in Frequent Pattern Mining P.Subhashini 1, Dr.G.Gunasekaran 2 Research Scholar, Dept. of Information Technology, St.Peter s University,
More informationAn Evolutionary Algorithm for Mining Association Rules Using Boolean Approach
An Evolutionary Algorithm for Mining Association Rules Using Boolean Approach ABSTRACT G.Ravi Kumar 1 Dr.G.A. Ramachandra 2 G.Sunitha 3 1. Research Scholar, Department of Computer Science &Technology,
More informationAn Automatic Reply to Customers Queries Model with Chinese Text Mining Approach
Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Hangzhou, China, April 15-17, 2007 71 An Automatic Reply to Customers E-mail Queries Model with Chinese Text Mining Approach
More informationDesign of student information system based on association algorithm and data mining technology. CaiYan, ChenHua
5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Design of student information system based on association algorithm and data mining technology
More informationA Classifier with the Function-based Decision Tree
A Classifier with the Function-based Decision Tree Been-Chian Chien and Jung-Yi Lin Institute of Information Engineering I-Shou University, Kaohsiung 84008, Taiwan, R.O.C E-mail: cbc@isu.edu.tw, m893310m@isu.edu.tw
More informationA Customer Segmentation Mining System on the Web Platform
Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2000 Proceedings Americas Conference on Information Systems (AMCIS) 2000 A Customer Segmentation Mining System on the Web Platform
More informationQuality Assessment of Power Dispatching Data Based on Improved Cloud Model
Quality Assessment of Power Dispatching Based on Improved Cloud Model Zhaoyang Qu, Shaohua Zhou *. School of Information Engineering, Northeast Electric Power University, Jilin, China Abstract. This paper
More informationApplication of Individualized Service System for Scientific and Technical Literature In Colleges and Universities
Journal of Applied Science and Engineering Innovation, Vol.6, No.1, 2019, pp.26-30 ISSN (Print): 2331-9062 ISSN (Online): 2331-9070 Application of Individualized Service System for Scientific and Technical
More informationYunfeng Zhang 1, Huan Wang 2, Jie Zhu 1 1 Computer Science & Engineering Department, North China Institute of Aerospace
[Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 20 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(20), 2014 [12526-12531] Exploration on the data mining system construction
More informationClustering of Data with Mixed Attributes based on Unified Similarity Metric
Clustering of Data with Mixed Attributes based on Unified Similarity Metric M.Soundaryadevi 1, Dr.L.S.Jayashree 2 Dept of CSE, RVS College of Engineering and Technology, Coimbatore, Tamilnadu, India 1
More informationThe Establishment of Large Data Mining Platform Based on Cloud Computing. Wei CAI
2017 International Conference on Electronic, Control, Automation and Mechanical Engineering (ECAME 2017) ISBN: 978-1-60595-523-0 The Establishment of Large Data Mining Platform Based on Cloud Computing
More informationCLASSIFICATION FOR SCALING METHODS IN DATA MINING
CLASSIFICATION FOR SCALING METHODS IN DATA MINING Eric Kyper, College of Business Administration, University of Rhode Island, Kingston, RI 02881 (401) 874-7563, ekyper@mail.uri.edu Lutz Hamel, Department
More informationDeep Web Content Mining
Deep Web Content Mining Shohreh Ajoudanian, and Mohammad Davarpanah Jazi Abstract The rapid expansion of the web is causing the constant growth of information, leading to several problems such as increased
More informationGenerating Optimized Decision Tree Based on Discrete Wavelet Transform Kiran Kumar Reddi* 1 Ali Mirza Mahmood 2 K.
Generating Optimized Decision Tree Based on Discrete Wavelet Transform Kiran Kumar Reddi* 1 Ali Mirza Mahmood 2 K.Mrithyumjaya Rao 3 1. Assistant Professor, Department of Computer Science, Krishna University,
More informationAN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE
AN OPTIMIZATION GENETIC ALGORITHM FOR IMAGE DATABASES IN AGRICULTURE Changwu Zhu 1, Guanxiang Yan 2, Zhi Liu 3, Li Gao 1,* 1 Department of Computer Science, Hua Zhong Normal University, Wuhan 430079, China
More informationCategorization of Sequential Data using Associative Classifiers
Categorization of Sequential Data using Associative Classifiers Mrs. R. Meenakshi, MCA., MPhil., Research Scholar, Mrs. J.S. Subhashini, MCA., M.Phil., Assistant Professor, Department of Computer Science,
More informationDatasets Size: Effect on Clustering Results
1 Datasets Size: Effect on Clustering Results Adeleke Ajiboye 1, Ruzaini Abdullah Arshah 2, Hongwu Qin 3 Faculty of Computer Systems and Software Engineering Universiti Malaysia Pahang 1 {ajibraheem@live.com}
More informationResearch and Improvement of Apriori Algorithm Based on Hadoop
Research and Improvement of Apriori Algorithm Based on Hadoop Gao Pengfei a, Wang Jianguo b and Liu Pengcheng c School of Computer Science and Engineering Xi'an Technological University Xi'an, 710021,
More informationEFFICIENT ALGORITHM FOR MINING FREQUENT ITEMSETS USING CLUSTERING TECHNIQUES
EFFICIENT ALGORITHM FOR MINING FREQUENT ITEMSETS USING CLUSTERING TECHNIQUES D.Kerana Hanirex Research Scholar Bharath University Dr.M.A.Dorai Rangaswamy Professor,Dept of IT, Easwari Engg.College Abstract
More informationIntelligent management of on-line video learning resources supported by Web-mining technology based on the practical application of VOD
World Transactions on Engineering and Technology Education Vol.13, No.3, 2015 2015 WIETE Intelligent management of on-line video learning resources supported by Web-mining technology based on the practical
More informationRETRACTED ARTICLE. Web-Based Data Mining in System Design and Implementation. Open Access. Jianhu Gong 1* and Jianzhi Gong 2
Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2014, 6, 1907-1911 1907 Web-Based Data Mining in System Design and Implementation Open Access Jianhu
More informationANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY
ANALYSIS OF DENSE AND SPARSE PATTERNS TO IMPROVE MINING EFFICIENCY A. Veeramuthu Department of Information Technology, Sathyabama University, Chennai India E-Mail: aveeramuthu@gmail.com ABSTRACT Generally,
More informationLecture Topic Projects 1 Intro, schedule, and logistics 2 Data Science components and tasks 3 Data types Project #1 out 4 Introduction to R,
Lecture Topic Projects 1 Intro, schedule, and logistics 2 Data Science components and tasks 3 Data types Project #1 out 4 Introduction to R, statistics foundations 5 Introduction to D3, visual analytics
More informationData warehousing in telecom Industry
Data warehousing in telecom Industry Dr. Sanjay Srivastava, Kaushal Srivastava, Avinash Pandey, Akhil Sharma Abstract: Data Warehouse is termed as the storage for the large heterogeneous data collected
More informationMedical Data Mining Based on Association Rules
Medical Data Mining Based on Association Rules Ruijuan Hu Dep of Foundation, PLA University of Foreign Languages, Luoyang 471003, China E-mail: huruijuan01@126.com Abstract Detailed elaborations are presented
More informationBinary Association Rule Mining Using Bayesian Network
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Binary Association Rule Mining Using Bayesian Network Venkateswara Rao Vedula 1 and
More informationInfrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset
Infrequent Weighted Itemset Mining Using SVM Classifier in Transaction Dataset M.Hamsathvani 1, D.Rajeswari 2 M.E, R.Kalaiselvi 3 1 PG Scholar(M.E), Angel College of Engineering and Technology, Tiruppur,
More informationDISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY) SEQUENTIAL PATTERN MINING A CONSTRAINT BASED APPROACH
International Journal of Information Technology and Knowledge Management January-June 2011, Volume 4, No. 1, pp. 27-32 DISCOVERING ACTIVE AND PROFITABLE PATTERNS WITH RFM (RECENCY, FREQUENCY AND MONETARY)
More informationThe main purpose of load balancing is to
INTERNATIONAL JOURNAL OF NETWORK MANAGEMENT Int. J. Network Mgmt 2005; 15: 311 319 Published online in Wiley InterScience (www.interscience.wiley.com). DOI: 10.1002/nem.567 IP layer load balance using
More informationData Mining Concepts
Data Mining Concepts Outline Data Mining Data Warehousing Knowledge Discovery in Databases (KDD) Goals of Data Mining and Knowledge Discovery Association Rules Additional Data Mining Algorithms Sequential
More informationData Mining. Chapter 1: Introduction. Adapted from materials by Jiawei Han, Micheline Kamber, and Jian Pei
Data Mining Chapter 1: Introduction Adapted from materials by Jiawei Han, Micheline Kamber, and Jian Pei 1 Any Question? Just Ask 3 Chapter 1. Introduction Why Data Mining? What Is Data Mining? A Multi-Dimensional
More informationResearch on Data Mining Technology Based on Business Intelligence. Yang WANG
2018 International Conference on Mechanical, Electronic and Information Technology (ICMEIT 2018) ISBN: 978-1-60595-548-3 Research on Data Mining Technology Based on Business Intelligence Yang WANG Communication
More informationAn Efficient Clustering Method for k-anonymization
An Efficient Clustering Method for -Anonymization Jun-Lin Lin Department of Information Management Yuan Ze University Chung-Li, Taiwan jun@saturn.yzu.edu.tw Meng-Cheng Wei Department of Information Management
More informationComparative Study of Apriori-variant Algorithms
Comparative Study of Apriori-variant Algorithms Sofianita Mutalib, Ammar Azri Abdul Subar, Shuzlina Abdul-Rahman, and Azlinah Mohamed Universiti Teknologi MARA (Shah Alam), Malaysia, {sofi, shuzlina, azlinah}@tmsk.uitm.edu.my
More informationStudy on Classifiers using Genetic Algorithm and Class based Rules Generation
2012 International Conference on Software and Computer Applications (ICSCA 2012) IPCSIT vol. 41 (2012) (2012) IACSIT Press, Singapore Study on Classifiers using Genetic Algorithm and Class based Rules
More informationInternational Journal of Advance Engineering and Research Development. A Survey on Data Mining Methods and its Applications
Scientific Journal of Impact Factor (SJIF): 4.72 International Journal of Advance Engineering and Research Development Volume 5, Issue 01, January -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 A Survey
More informationQUALITATIVE MODELING FOR MAGNETIZATION CURVE
Journal of Marine Science and Technology, Vol. 8, No. 2, pp. 65-70 (2000) 65 QUALITATIVE MODELING FOR MAGNETIZATION CURVE Pei-Hwa Huang and Yu-Shuo Chang Keywords: Magnetization curve, Qualitative modeling,
More information[Shingarwade, 6(2): February 2019] ISSN DOI /zenodo Impact Factor
GLOBAL JOURNAL OF ENGINEERING SCIENCE AND RESEARCHES DEVELOPMENT OF TOP K RULES FOR ASSOCIATION RULE MINING ON E- COMMERCE DATASET A. K. Shingarwade *1 & Dr. P. N. Mulkalwar 2 *1 Department of Computer
More informationRestricted Nearest Feature Line with Ellipse for Face Recognition
Journal of Information Hiding and Multimedia Signal Processing c 2012 ISSN 2073-4212 Ubiquitous International Volume 3, Number 3, July 2012 Restricted Nearest Feature Line with Ellipse for Face Recognition
More informationA New Technique to Optimize User s Browsing Session using Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationDevelopment of an interface that allows MDX based data warehouse queries by less experienced users
Development of an interface that allows MDX based data warehouse queries by less experienced users Mariana Duprat André Monat Escola Superior de Desenho Industrial 400 Introduction Data analysis is a fundamental
More informationMaintenance of Generalized Association Rules for Record Deletion Based on the Pre-Large Concept
Proceedings of the 6th WSEAS Int. Conf. on Artificial Intelligence, Knowledge Engineering and ata Bases, Corfu Island, Greece, February 16-19, 2007 142 Maintenance of Generalized Association Rules for
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK EFFICIENT ALGORITHMS FOR MINING HIGH UTILITY ITEMSETS FROM TRANSACTIONAL DATABASES
More informationParameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu 1,a, Yanhua Gu 2,b *, Xiaoyu Wang 3,b, Xiu Fang Zhang 4
5th International Conference on Advanced Engineering Materials and Technology (AEMT 205) Parameter Modeling for Single Screw Pump Based On CATIA Secondary Development Platform Heng Fu,a, Yanhua Gu 2,b
More informationInformation Push Service of University Library in Network and Information Age
2013 International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2013) Information Push Service of University Library in Network and Information Age Song Deng 1 and Jun Wang
More informationA Data Mining Framework for Extracting Product Sales Patterns in Retail Store Transactions Using Association Rules: A Case Study
A Data Mining Framework for Extracting Product Sales Patterns in Retail Store Transactions Using Association Rules: A Case Study Mirzaei.Afshin 1, Sheikh.Reza 2 1 Department of Industrial Engineering and
More informationGraph Based Approach for Finding Frequent Itemsets to Discover Association Rules
Graph Based Approach for Finding Frequent Itemsets to Discover Association Rules Manju Department of Computer Engg. CDL Govt. Polytechnic Education Society Nathusari Chopta, Sirsa Abstract The discovery
More informationApplication of Clustering as a Data Mining Tool in Bp systolic diastolic
Application of Clustering as a Data Mining Tool in Bp systolic diastolic Assist. Proffer Dr. Zeki S. Tywofik Department of Computer, Dijlah University College (DUC),Baghdad, Iraq. Assist. Lecture. Ali
More informationPerformance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM
Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.
More informationDomain Specific Search Engine for Students
Domain Specific Search Engine for Students Domain Specific Search Engine for Students Wai Yuen Tang The Department of Computer Science City University of Hong Kong, Hong Kong wytang@cs.cityu.edu.hk Lam
More informationImprovements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao Fan1, Yuexin Wu2,b, Ao Xiao1
3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) Improvements and Implementation of Hierarchical Clustering based on Hadoop Jun Zhang1, a, Chunxiao
More informationGPU-Accelerated Apriori Algorithm
GPU-Accelerated Apriori Algorithm Hao JIANG a, Chen-Wei XU b, Zhi-Yong LIU c, and Li-Yan YU d School of Computer Science and Engineering, Southeast University, Nanjing, China a hjiang@seu.edu.cn, b wei1517@126.com,
More informationThe application of OLAP and Data mining technology in the analysis of. book lending
2nd International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2017) The application of OLAP and Data mining technology in the analysis of book lending Xiao-Han Zhou1,a,
More informationA Novel Method of Optimizing Website Structure
A Novel Method of Optimizing Website Structure Mingjun Li 1, Mingxin Zhang 2, Jinlong Zheng 2 1 School of Computer and Information Engineering, Harbin University of Commerce, Harbin, 150028, China 2 School
More informationDeriving Trading Rules Using Gene Expression Programming
22 Informatica Economică vol. 15, no. 1/2011 Deriving Trading Rules Using Gene Expression Programming Adrian VISOIU Academy of Economic Studies Bucharest - Romania Economic Informatics Department - collaborator
More informationEfficient Algorithm for Frequent Itemset Generation in Big Data
Efficient Algorithm for Frequent Itemset Generation in Big Data Anbumalar Smilin V, Siddique Ibrahim S.P, Dr.M.Sivabalakrishnan P.G. Student, Department of Computer Science and Engineering, Kumaraguru
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 3, March 2015 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationDMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE
DMSA TECHNIQUE FOR FINDING SIGNIFICANT PATTERNS IN LARGE DATABASE Saravanan.Suba Assistant Professor of Computer Science Kamarajar Government Art & Science College Surandai, TN, India-627859 Email:saravanansuba@rediffmail.com
More informationKnowledge Discovery in Data Bases
Knowledge Discovery in Data Bases Chien-Chung Chan Department of CS University of Akron Akron, OH 44325-4003 2/24/99 1 Why KDD? We are drowning in information, but starving for knowledge John Naisbett
More informationA Review on Cluster Based Approach in Data Mining
A Review on Cluster Based Approach in Data Mining M. Vijaya Maheswari PhD Research Scholar, Department of Computer Science Karpagam University Coimbatore, Tamilnadu,India Dr T. Christopher Assistant professor,
More informationKeywords Data alignment, Data annotation, Web database, Search Result Record
Volume 5, Issue 8, August 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Annotating Web
More informationConstruction of the Library Management System Based on Data Warehouse and OLAP Maoli Xu 1, a, Xiuying Li 2,b
Applied Mechanics and Materials Online: 2013-08-30 ISSN: 1662-7482, Vols. 380-384, pp 4796-4799 doi:10.4028/www.scientific.net/amm.380-384.4796 2013 Trans Tech Publications, Switzerland Construction of
More informationFeature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process
Feature Selection Technique to Improve Performance Prediction in a Wafer Fabrication Process KITTISAK KERDPRASOP and NITTAYA KERDPRASOP Data Engineering Research Unit, School of Computer Engineering, Suranaree
More informationIJMIE Volume 2, Issue 9 ISSN:
WEB USAGE MINING: LEARNER CENTRIC APPROACH FOR E-BUSINESS APPLICATIONS B. NAVEENA DEVI* Abstract Emerging of web has put forward a great deal of challenges to web researchers for web based information
More informationImplementation of a wireless energy management and safety system
International Journal of Smart Grid and Clean Energy Implementation of a wireless energy management and safety system Cheng-Chien Kuo a, Han-Ching Lin b a Saint John s University, 499, Sec. 4, Tamking
More informationAn Algorithm for Mining Frequent Itemsets from Library Big Data
JOURNAL OF SOFTWARE, VOL. 9, NO. 9, SEPTEMBER 2014 2361 An Algorithm for Mining Frequent Itemsets from Library Big Data Xingjian Li lixingjianny@163.com Library, Nanyang Institute of Technology, Nanyang,
More informationTag Based Image Search by Social Re-ranking
Tag Based Image Search by Social Re-ranking Vilas Dilip Mane, Prof.Nilesh P. Sable Student, Department of Computer Engineering, Imperial College of Engineering & Research, Wagholi, Pune, Savitribai Phule
More informationAuthenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem
Authenticated Key Agreement Without Using One-way Hash Functions Based on The Elliptic Curve Discrete Logarithm Problem Li-Chin Huang and Min-Shiang Hwang 1 Department of Computer Science and Engineering,
More informationData mining overview. Data Mining. Data mining overview. Data mining overview. Data mining overview. Data mining overview 3/24/2014
Data Mining Data mining processes What technological infrastructure is required? Data mining is a system of searching through large amounts of data for patterns. It is a relatively new concept which is
More informationData Mining Download or Read Online ebook data mining in PDF Format From The Best User Guide Database
Free PDF ebook Download: Download or Read Online ebook data mining in PDF Format From The Best User Guide Database Vipin Kumar, Data mining course at University of Minnesota. Jiawei Han, slides of the
More information